T. Caulfield
Compositional Security Modelling Structure, Economics, and Behaviour
Caulfield, T.; Pym, D.; Williams, J.
Abstract
Security managers face the challenge of formulating and implementing policies that deliver their desired system security postures — for example, their preferred balance of confidentiality, integrity, and availability — within budget (monetary and otherwise). In this paper, we describe a security modelling methodology, grounded in rigorous mathematical systems modelling and economics, that captures the managers’ policies and the behavioural choices of agents operating within the system. Models are executable, so allowing systematic experimental exploration of the system-policy co-design space, and compositional, so managing the complexity of large-scale systems.
Citation
Caulfield, T., Pym, D., & Williams, J. (2014). Compositional Security Modelling Structure, Economics, and Behaviour. In Human aspects of information security, privacy, and trust : 2nd International Conference, HAS 2014, Held as part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014 : proceedings (233-245). Springer Verlag. https://doi.org/10.1007/978-3-319-07620-1_21
Publication Date | Jun 27, 2014 |
---|---|
Deposit Date | Jun 30, 2015 |
Publicly Available Date | Jul 7, 2015 |
Publisher | Springer Verlag |
Pages | 233-245 |
Series Title | Lecture notes in computer science |
Series Number | 8533 |
Book Title | Human aspects of information security, privacy, and trust : 2nd International Conference, HAS 2014, Held as part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014 : proceedings |
ISBN | 9783319076195 |
DOI | https://doi.org/10.1007/978-3-319-07620-1_21 |
Public URL | https://durham-repository.worktribe.com/output/1675288 |
Additional Information | Volume title: Human Aspects of Information Security, Privacy, and Trust: Second International Conference, HAS 2014, Held as Part of HCI International 2014, Heraklion, Crete, Greece, June 22-27, 2014. Proceedings. Edited by: Theo Tryfonas and Ioannis Askoxylakis. |
Files
Accepted Book Chapter
(412 Kb)
PDF
Copyright Statement
The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-07620-1_21
You might also like
JUNE: open-source individual-based epidemiology simulation
(2021)
Journal Article
The Work-Averse Cyber Attacker Model: Theory and Evidence From Two Million Attack Signatures
(2021)
Journal Article
Testing the Eigenvalue Structure of Spot and Integrated Covariance
(2021)
Journal Article
Downloadable Citations
About Durham Research Online (DRO)
Administrator e-mail: dro.admin@durham.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search